Cyber Posture

CVE-2025-0074

Critical

Published: 26 August 2025

Published
26 August 2025
Modified
02 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0178 82.8th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0074 is a critical-severity Use After Free (CWE-416) vulnerability in Google Android. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the use-after-free vulnerability by requiring timely identification, reporting, and application of the specific upstream patch for the Bluetooth SDP processing flaw.

prevent

Implements memory protection mechanisms such as address space randomization and non-executable memory that defend against exploitation of the use-after-free in sdp_discovery.cc.

prevent

Authorizes and controls wireless Bluetooth access to limit exposure to remote crafted SDP discovery response packets that trigger the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Use-after-free in Bluetooth SDP handler directly enables unauthenticated remote code execution over a network protocol with no user interaction.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In process_service_attr_rsp of sdp_discovery.cc, there is a possible way to execute arbitrary code due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2025-0074 is a use-after-free vulnerability in the process_service_attr_rsp function within sdp_discovery.cc, part of the Android platform's Bluetooth module located at packages/modules/Bluetooth. This flaw enables arbitrary code execution, potentially leading to remote code execution without requiring additional execution privileges. The vulnerability is classified under CWE-416 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, and lack of prerequisites.

A remote attacker can exploit this vulnerability by triggering the use-after-free condition during Bluetooth Service Discovery Protocol (SDP) interactions, achieving remote code execution on the targeted Android device. No user interaction is required, and no privileges are needed, making it accessible to any adversary within Bluetooth range who can send crafted SDP discovery response packets.

Mitigation is addressed in the Android Security Bulletin for March 2025, available at https://source.android.com/security/bulletin/2025-03-01. A specific upstream patch fixing the issue is provided at https://android.googlesource.com/platform/packages/modules/Bluetooth/+/37bcf769c1aa8dfa8e5524858d47f6a80b765fa4, which security practitioners should verify and apply to affected Android builds.

Details

CWE(s)

Affected Products

google
android
15.0

CVEs Like This One

CVE-2025-0084Same product: Google Android
CVE-2025-22403Same product: Google Android
CVE-2025-22408Same product: Google Android
CVE-2024-40651Same product: Google Android
CVE-2025-48543Same product: Google Android
CVE-2025-22409Same product: Google Android
CVE-2025-0075Same product: Google Android
CVE-2024-40669Same product: Google Android
CVE-2024-40670Same product: Google Android
CVE-2025-22404Same product: Google Android

References